[LINK] ID theft brings tech to law

Roger Clarke Roger.Clarke at xamax.com.au
Tue Sep 18 10:00:29 AEST 2007


>On Tue, 2007-09-18 at 06:50 +0800, Bernard Robertson-Dunn wrote:
>>http://www.australianit.news.com.au/story/0,24897,22435327-15306,00.html
>>  "That means someone needs to be acknowledging the strengths and
>>  weaknesses of different and competing technologies. We're seeing a
>>  change of climate around that." The concept of technology neutrality -
>>  which meant legislation was drafted to apply to the handling of
>>  information in any context - was past its use-by date, Mr Wilson said.

At 9:16 +1000 18/9/07, Karl Auer wrote:
>I'd like to see a concrete example, where the technology itself is
>relevant to its misuse. Can't think of one off the top of my head. It
>seems to me that "passing off" whether a product or am identity, can be
>clearly enough defined to make identity theft and the preparation for
>identity theft illegal, without needing to specify any specific
>technologies at all.

These are musings rather than direct engagement with Karl's argument:

Firstly, let's get the expression 'identity theft' out of the way.

Id theft is a fair description of a phenomenon that occurs (in 
Australia, and indeed everywhere else except perhaps the US) 
extremely rarely.

Id *fraud*, on the other hand, is rampant, and that's the term that 
needs to be used, and a problem that needs to be focussed on.

Secondly, let's always keep squarely in view the fact that the root 
cause of the id fraud epidemic of the last few decades is the utterly 
naive design of the credit-card system.  If we were going to design a 
convenient high-volume payments system, that wouldn't be it.

Karl, I suspect that when we get down to specifics of what 
constitutes id fraud, and preparation for id fraud, some differences 
in language may be needed in different circumstances.

A dumpster diving expedition can be looking for copper pipe and a 
host of other valuable-to-me-not-to-them items, as well as paper 
containing data that can be used for id fraud.

A keystroke logger that targets passwords, or an email-filter that 
parses for credit-card details, is a horse of a different colour. 
But to outlaw keystroke loggers or email-filters would be quite silly.

Can we define the specific actions that are criminal without getting 
down to tin tacks?  And, if we do that, can we avoid 
technology-specific descriptions?

I've been a critic of the UNCITRAL mania for technology neutrality 
for a long time, because I see it as a cop-out by lawyers who don't 
understand technology and who don't want to get their hands dirty.

A working rule that says 'mainly focus on the generic'? - yep, I 
fully support that.  Unpreparedness to look deeper, and regulate at a 
deeper level if the situation warrants it? - nope, not good enough.

Admittedly my focus in the past has been on authentication generally, 
and biometrics especially.  I'm unsure what I think in the id fraud 
area, because I haven't had occasion to get deeply enough inside it.


-- 
Roger Clarke                  http://www.anu.edu.au/people/Roger.Clarke/

Xamax Consultancy Pty Ltd      78 Sidaway St, Chapman ACT 2611 AUSTRALIA
                    Tel: +61 2 6288 1472, and 6288 6916
mailto:Roger.Clarke at xamax.com.au                http://www.xamax.com.au/

Visiting Professor in Info Science & Eng  Australian National University
Visiting Professor in the eCommerce Program      University of Hong Kong
Visiting Professor in the Cyberspace Law & Policy Centre      Uni of NSW



More information about the Link mailing list